Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
Security experts are sizing up the challenges that would be involved in implementing a federal government proposal to continuously monitor employees and contractors with security clearances in hopes of preventing leaks of sensitive information.
In a preliminary step toward enactment of a new EU data protection law, the European Parliament on March 12 approved a draft proposal for a comprehensive overhaul of the EU's 1995 data protection directive.
Disclosing that it fulfilled only 11 percent of the requests for customer information from U.S. law enforcement agencies during the second half of 2013, Microsoft reiterates its call for an international framework that protects customers' rights.
Many enterprises are moving quickly to adopt "big data analytics" - specifically, the application of advances in analytics techniques to the rapidly-expanding pool of information that enterprises have at their disposal to enable better decision making. As this trend of adoption continues, information security, risk...
An address by FBI Director James Comey at the RSA security conference seems to equate civil liberties and privacy. But when he offers an example of balancing Americans' rights with cybersecurity, he mainly refers to the civil liberties, not privacy.
Simple credentials, such as passwords, are a hacker's best friend, says Phillip Dunkelberger of Nok Nok Labs, a founding member of the FIDO Alliance. That's why the alliance is working to reduce reliance on passwords by enabling advanced authentication.
2014 is finally the "The Year of Security." When the year stars fresh on the heels of the announcement that Target has suffered a data breach that impacts tens of millions of consumer payment cards ... that gets attention. And when that's followed up quickly with a second major breach, this one of luxury retailer...
As the evolving healthcare industry faces increasing challenges to keep personal health information protected - including growing volumes of electronic health records, new government regulations, and a more complex IT security landscape - there is a growing need to ensure knowledgeable and credentialed security and...
Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014.
Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."
A government watchdog plans a variety of activities to scrutinize the data security practices of healthcare providers, including hospitals' security controls over medical devices. It also will take a close look at the HealthCare.gov website.
The breach at Target stores that may have affected as many as 40 million credit and debit card account holders is a watershed moment that could greatly raise awareness of cybersecurity risks, says privacy attorney David Navetta.